Mobility

We discuss the growing importance of enterprise mobility and the technology behind mobile application development.

  • White Papers // Jul 2014

    A secure, scalable and cost-effective Cloud Platform

    This case study explores the challenges faced by Tickethour before to entering to the UK market, and the reasons that took them to consider a Cloud base solution that offered security and scalability while guaranteeing an ease use and efficient maintenance process.

    Sponsored By Fujitsu

  • Live Event // Jul 2014

    Live Webcast: The Future of Meetings

    Join us for this LIVE event! Thursday, August 7, 2014 10 AM (PDT) / 1 PM (EDT) Let’s face it -- your meetings have likely gone a bit out of control. With more time allocated for gathering than for actual work, companies of all shapes and sizes are suffering from...

    Sponsored By Citrix Online

  • White Papers // May 2014

    Transform Your Future with Predictive Insight

    Learn how to take advantage of in-memory technology to reduce the time and cost of data processing and perform predictive analyses against vast data volumes. You can design complex models and visualize, discover, and share insights – and do it in real time by harnessing the power of SAP HANA...

    Sponsored By SAP

  • White Papers // May 2014

    Whitepaper: What Your Peers Are Doing to Prime Their  Human Resources and Financial Systems

    Businesses facing growth and change require systems that evolve with them. The fact is, traditional software is simply too rigid to keep pace. Your savvy peers are transforming their systems to run in the cloud. Read the whitepaper to learn how you can, too, and benefit long into the future.

    Sponsored By Workday

  • Webcasts // May 2014

    Webinar: Why It's Time to Retire that Aging HR System and Embrace the Cloud!

    You need the latest workforce cost reports at your fingertips. And your organization's employees want to go mobile. But you're struggling with a system designed back in the 80s that was last upgraded years ago. In this webinar, HR leaders share the benefits of moving to the cloud.

    Sponsored By Workday

  • Downloads // Oct 2013

    Intel® Inspector XE 2013

    Intel® Inspector XE finds memory leaks, corruption, deadlocks, data races, and more in C, C++, C#, F#, Fortran, and MPI applications. Use a normal build: no special compiler or recompiles are required. Heap growth analysis and debugger breakpoints simplify diagnosis of difficult bugs early in the development cycle―when they are...

    Sponsored By Intel Software

  • White Papers // Mar 2014

    Global Compliance for Data Security

    Driven on by relentless news about security breaches and data loss, law makers and regulators the world over are increasingly engaged in implementing new legal frameworks and defining new obligations for data security. Prominent within recent legal developments has been a focus on encryption, not only of portable equipment and...

    Sponsored By Vormetric

  • White Papers // May 2014

    SAP Enterprise Mobility: Bringing a Cohesive Approach to a Complex Market

    Social, mobile, big data, and cloud technologies are creating complexity for the enterprise, but embracing the changes associated with this third "wave" of IT can lead to more productive mobile workers as well as better communications with employees, partners, and customers. The trends in the enterprise mobility landscape drive a...

    Sponsored By SAP

  • White Papers // May 2014

    Driving Business Innovation with a New Generation

    Every industry that is dependent on information technology (IT) is in the midst of a major transition brought about by the combination of four primary forces. These four forces make up the 3rd Platform for business applications, succeeding client/server (2nd Platform) and mainframes (1st Platform). The 3rd Platform takes applications...

    Sponsored By SAP

  • White Papers // May 2014

    IT Simplification with the SAP HANA Platform

    The future of business is being reshaped. The convergence of cloud, mobile, social, and Big Data technologies is empowering individuals like never before. At a time when technology is being used to help make everything smarter, faster, and simpler, organizations need to master these technologies in order to meet customer...

    Sponsored By SAP

  • White Papers // Jan 2014

    Big Data, Big Risks

    The cloud computing landscape continues to realize explosive growth. This white paper outlines what IT and security professionals need to know about the significant security risks of big data, including critical security vulnerabilities, risks, and challenges, key business and technical issues such as controls, privacy, and compliance and effective and...

    Sponsored By Vormetric

  • White Papers // May 2014

    Real-Time Insights to Forge Deeper Relationships with Your Customers

    The next step in the evolution of SAP HANA is becoming the foundation for a new generation of real-time applications such as SAP Customer Engagement Intelligence. This application enables highly targeted marketing campaigns and fosters deeper relationships with customers, giving you a better understanding of their needs.

    Sponsored By SAP

  • White Papers // Feb 2014

    The Right Way to Prove Identity and Establish Trust

    Right now, one of your employees is accessing network resources. Do you know who it is? See how to verify user identities and protect your company’s critical information. Read this technical brief.

    Sponsored By Dell Software

  • White Papers // May 2014

    A Cohesive Approach to a Complex Market

    The mobile enterprise is becoming more complex with the consumerization of IT, the mobile app explosion and cloud computing. In this report, IDC covers key trends and what companies should look for in a partner that can help them manage it all.

    Sponsored By SAP

  • White Papers // Jun 2014

    BYOD File Sharing – Go Private Cloud to Mitigate Data Risks

    The consumerization of IT and the popularity of BYOD (Bring Your Own Device) are jeopardizing the security and integrity of business data. Seeking an easy way to share files across smartphones, tablets, and desktops, employees are signing up for free public cloud file sharing services that lack rigorous security and...

    Sponsored By Accellion

  • White Papers // Jun 2014

    GigaOm Pro: The Rewards and Risks of Enterprise Mobility

    The productivity gains that are uniquely enabled by the cloud and mobile also present significant enterprise security challenges. Valuable and private data stored on mobile devices presents potential nightmare scenarios for departments and teams using the technology as well as CIOs, CSOs, and IT managers. This research report will outline...

    Sponsored By Accellion

  • White Papers // Jun 2014

    Data Security for Mobile Users: One Size Does Not Fit All

    Mobile computing is ubiquitous, but security solutions for mobile workers are not. For mobile security to be effective, tools and policies often need to be customized for specific users, roles, departments; or technologies. Rather than investing in solutions and enforcing security policies that treat all mobile users alike, IT should...

    Sponsored By Accellion

  • White Papers // Jun 2014

    Mobile Data Security: Best Practices for Securing Your Mobile Workforce

    The typical mobile worker is carrying three or more mobile devices, at least one of which is a personal device brought from home. Organizations need to protect their data on every mobile device it resides. Unfortunately, enterprise mobile security falls short much of the time. Read this whitepaper to learn...

    Sponsored By Accellion

  • White Papers // Jun 2014

    Survey Report: Mobile Content Security and Productivity

    This report provides the key findings taken from a survey conducted by AIIM (an advocate and supporter of information professionals) between June and July 2013. Learn how important mobile access is to users, how likely they are to by-pass authorized systems, how compliant current collaboration practices are, and what collaboration...

    Sponsored By Accellion

  • White Papers // Jul 2014

    Using Encryption and Access Control for HIPAA Compliance

    Since 1997 Fortrex Technologies, Inc. has been providing IT Governance, Risk, and Compliance advisory services and solutions. In this white paper Fortrex explores how encryption, access control and file access audit logs from Vormetric can Contributes to HIPAA compliance and exempt from notification requirements of HITECH.

    Sponsored By Vormetric

  • White Papers // Feb 2014

    Containerized Power and Cooling Modules for Data Centers

    Standardized, pre-assembled and integrated data center facility power and cooling modules are at least 60% faster to deploy, and provide a first cost savings of 13% or more compared to traditional data center power and cooling infrastructure. Facility modules, also referred to in the data center industry as containerized power...

    Sponsored By APC by Schneider Electric

  • White Papers // Jun 2014

    The Use of Ceiling-Ducted Air Containment in Data Centers

    Ducting hot IT-equipment exhaust to a drop ceiling can be an effective air management strategy, improving the reliability and energy efficiency of a data center. Typical approaches include ducting either individual racks or entire hot aisles and may be passive (ducting only) or active (include fans). This paper examines available...

    Sponsored By APC by Schneider Electric

  • White Papers // Mar 2014

    Security in the Cloud for SAP HANA

    High-speed data analytics is changing the way companies compete, enabling them to generate real-time insights to support their most important business processes. Cloud computing offers a complementary technology that also provides game-changing capabilities for business computing. Yet many companies have been reluctant to deploy mission-critical applications, such as SAP HANA,...

    Sponsored By Vormetric

  • White Papers // Aug 2013

    Making Smarter Mobile Access Decisions

    Mobile devices can represent a significant threat to corporate data. Find out what IT departments need to know before deciding on a smartphone and tablet platform that is safe, easy to configure, and flexible enough to meet the needs of employees and senior executives alike.

    Sponsored By Dell Software

  • White Papers // Jul 2014

    Meeting PCI DSS 3.0 Requirements with Data-at-Rest Encryption, Access Control and Data Access Audit Logs

    This white paper outlines how to use Vormetric Transparent Encryption to meet PCI DSS 3.0 Requirements with Data-at-Rest Encryption, Access Control and Data Access Audit Logs in traditional server, virtual, cloud and big data environments. The paper maps PCI DSS requirements 3, 7, 8, 9 and 10 that can be...

    Sponsored By Vormetric

  • Downloads // Oct 2013

    Intel® VTune ™ Amplifier XE 2013

    Advanced performance and thread profiler for C, C++, C#, Fortran, Java, and MPI developers. New pre-sets deliver easier ‟point and shoot” profiling set-up. A threading timeline, data filtering, frame analysis, and source display make it easier to tune your application for today’s and tomorrow’s processors. Powerful bandwidth and memory access...

    Sponsored By Intel Software

  • White Papers // Apr 2014

    Forrester Report: Measuring Mobile Apps

    Developers need to improve their mobile measurement savvy. Many application development professionals have little to no skills in collecting real-time and operational metrics; that’s usually been the province of infrastructure and operations pros. But such thinking is both antiquated and dangerous. As requirements elicitation shifts from long textual requirements documents...

    Sponsored By Hewlett-Packard (HP)

  • White Papers // Nov 2013

    Developing More Effective Mobile Enterprise Programs

    This paper outlines practical “how-to” guidance to strategize and implement more effective mobile enterprise programs and details the robust capabilities that mobile enterprise partners can bring to the development and support of your corporate owned device or BYOD mobile enterprise programs. It focuses on mobile enterprise programs for employees, as...

    Sponsored By IBM

  • White Papers // May 2014

    HP TippingPoint Next-Generation Firewall

    This paper explores the threats, security risks and cyber attacks evolving in IT infrastructure, networks and data centres.

    Sponsored By HP

  • White Papers // May 2014

    Case Study: Transplace improves network security and availability with TippingPoint IPS

    It's necessary to have a better network security and protect your business from any attacks. This case study provides some insights on how to improve network security and availability. Read this report now to learn how HP helped Transplace identifies the source of security attacks and solve them before...

    Sponsored By HP

  • Downloads // Mar 2014

    Free Trial - Unified IT Monitoring for Infrastructure and Applications with up.time®

    up.time is enterprise-level IT monitoring that’s up to 50% more cost effective than traditional “Big 4” monitoring tools. Get the comprehensive features, deep reporting, and proactive monitoring you need for a unified view of IT performance, availability, and capacity. up.time monitors across platforms, including all infrastructure (servers, VMs, network devices)...

    Sponsored By Uptime Software

  • Podcasts // Jan 2014

    Stepping Into the Cloud: A Practical Guide to Launching a Successful Cloud Strategy

    Frost & Sullivan’s video “Stepping into the Cloud: A Practical Guide to Creating and Implementing a Successful Cloud Strategy” offers practical guidance for migrating your company to the cloud -- at your own pace and on your own schedule. Take the first step today.

    Sponsored By IBM

  • White Papers // Jun 2014

    Whitepaper: How the Cloud will change Application Release Operations

    This whitepaper outlines how application release operations will change in response to the cloud and it defines the key ingredients needed to help ensure that your enterprise’s release operations for production applications don’t get left behind.

    Sponsored By CA Technologies

  • White Papers // Jul 2014

    Real-time agility: Core principles and practices for embedded-software teams

    This paper introduces practical approaches to Agile focused on core principles and practices and shows how they improve project results for embedded systems development. Agile methods are a cohesive set of concepts, principles and practices to address the challenges of software development.

    Sponsored By IBM

  • White Papers // Jul 2014

    Simplifying cloud management and data center automation

    This white paper explores the value of standardizing and automating cloud services with a flexible platform, such as IBM Cloud Orchestrator. Learn how to orchestrate the development, deployment and management of cloud services - helping to reduce IT costs and accelerate service delivery.

    Sponsored By IBM

  • eBooks // Jul 2014

    Agile in the embedded world

    This paper introduces practical approaches to Agile focused on core principles and practices and shows how they improve project results for embedded systems development. Agile methods are a cohesive set of concepts, principles and practices to address the challenges of software development.

    Sponsored By IBM

  • White Papers // Jul 2014

    IaaS Public Clouds and the Perceived Security Threat

    Present concerns about cloud security are reminiscent of the fears in the 1980s of LANs and a highly distributed IT infrastructure, and they also echo the efforts in the 1990s to stop Internet usage at work. But the issue really isn't security; it's governance to ensure interoperability and portability. We...

    Sponsored By Global Knowledge

  • White Papers // Jul 2014

    SDN and Cloud Computing

    After a review of Software-Defined Networking (SDN) and its close cousin Network Functions Virtualization (NFV), this white paper addresses three main deployment scenarios: SDN without deploying cloud computing, cloud computing without deploying SDN, and deploying cloud computing in conjunction with SDN. We'll look at use cases, when the approach makes...

    Sponsored By Global Knowledge

  • White Papers // Jul 2014

    Mobility is moving fast: Seven Questions that Prepare you for BYOD

    Are you ready for BYOD? For successful BYOD operations, organizations must address issues they may not have considered yet, but that can have significant consequences for business and IT operations. Here are seven questions you should answer as you roll out new mobile capabilities

    Sponsored By IBM

  • White Papers // Jul 2014

    Top 6 Project Breakdowns and How to Fix Them

    Project management is either one of those things that you are really good at and you can breeze right through without any issues, or it’s something that drives you crazy. Every business owner has experienced some form of project failure, but why? Study the top reasons that projects fail to...

    Sponsored By ConnectWise